part - iv computer science - solutionsadda

15
Part - IV Computer Science 71. Which of the following algorithms use recursion for sorting an array of integers? A. Bubble sort and Insertion sort B. Bubble sort and Quicksort C. Bubble sort and merge sort D. Quicksort and merge sort 72. ______ operation preserves those tuples that would be lost in____ A. Natural join, outer join B. Outer join, natural join C. Left outer join, right outer join D. Left outer join, natural join 73. Social network analysts use ____ to access facebook data A. Facebook system calls B. Facebook APIs C. Facebook Scripts D. Facebook System Libraries 74. In which of the topology, each device has a dedicated point-to-point link to a central controller? A. Mesh B. Bus C. Ring D. Star 75. While making bubbled lists, which of the following options are available? A. Square,disc,tringle B. Triangle,disc,circle C. Triangle,square,circle D. Disc,square,circle 76. Resolution of externally defined symbols is performed by____ A. Linker B. Loader C. Compiler D. Editor 77. In which case it is mandatory to provide a destructor in a class? A. Almost in every class B. Class for which two or more than two objects will be created C. Class for which copy constructor

Upload: others

Post on 01-May-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Part - IV Computer Science - Solutionsadda

Part - IV Computer Science

71. Which of the following algorithms use recursion for sorting an array of integers? A. Bubble sort and Insertion sort B. Bubble sort and Quicksort C. Bubble sort and merge sort D. Quicksort and merge sort

72. ______ operation preserves those tuples that would be lost in____ A. Natural join, outer join B. Outer join, natural join C. Left outer join, right outer join D. Left outer join, natural join

73. Social network analysts use ____ to access facebook data A. Facebook system calls B. Facebook APIs C. Facebook Scripts D. Facebook System Libraries

74. In which of the topology, each device has a dedicated point-to-point link to a central controller? A. Mesh B. Bus C. Ring D. Star

75. While making bubbled lists, which of the following options are available? A. Square,disc,tringle B. Triangle,disc,circle C. Triangle,square,circle D. Disc,square,circle

76. Resolution of externally defined symbols is performed by____ A. Linker B. Loader C. Compiler D. Editor

77. In which case it is mandatory to provide a destructor in a class? A. Almost in every class B. Class for which two or more than two objects will be created C. Class for which copy constructor

Page 2: Part - IV Computer Science - Solutionsadda

D. Class whose objects will be created dynamically

78. Action implementing instructor’s meaning are actually carried out by____ A. Instruction fetch B. Instruction decode C. Instruction execution D. Instruction program

79.Given a relation schema R(ABCDEFGH) in first normal form. For the set of dependencies F={ A→ B, A→ C, CG→ H, B→ H, G→ F}, which dependency is logically implied? A. AC→ H B. C→ H C. G→ H D. A→ H

80. To load a byte of data parallelly into a shift register with a synchronous load, there must be__ A. One clock pulse B. One clock pulse for each 1 in the data C. Eight clock pulses D. One clock pulse for each 0 in the data

81. Which of the following is the correct declaration of linked list? A. Struct node* { Int data; node*link; } B) Struct node { int data; Struct node*link; } C) Struct node { int data; node link; } D) Struct node* { int data; struct node*link; }

82. The operation executed on data stored in registers is called____ A. Macro operation

Page 3: Part - IV Computer Science - Solutionsadda

B. Micro operation C. Bit operation D. Byte operation

83. Which of the following is true about time value assignment in VBscript? A. The time value should be assigned without double quotes(“). B. The time value should be enclosed within double quotes(“). C. The time value should be enclosed within single quotes(‘); D. The time value should be enclosed within hash symbols(#).

84. Shifting a register content to left by one bit is equivalent to____ A. Division by 2 B. Addition by 2 C. Multiplication by 2 D. Subtraction by 2

85. Consider the relation Emp-Dept with SSn as key Ename SSn EAddr Dept.No Dept.Name Dept. Manager SSn Which of the following is (are) invalid operation(s)? a) Inserting an employee without name and address b) Inserting an employee with only SSn c) Inserting a department with no employee d) Inserting an employee without SSn

86. What shall be the 2’s complement represented of -24 in a 16 bit computer? A. 1111 1111 1110 1011 B. 1111 1111 1110 1001 C. 1111 1111 1110 0111 D. 1111 1111 1110 1000

87. Which of the following is/are wrong? a) RAM and ROM are volatile memories b) ROMs,PROMs and EPROMs are non volatile memories c) RAM and Dynamic RAM are same d) A random access memory(RAM) is a read write memory A. (a) and (b) B. (a) and (c) C. (a) and (d) D. (c) and (d)

88.The process of removing deficiencies and loopholes in the data is called as____ A. Data aggregation B. Extraction of data C. Compression of data

Page 4: Part - IV Computer Science - Solutionsadda

D. Cleaning of data

89. Consider the following three binary trees, each with 7 nodes

Then A is____binary tree, B is ___binary tree and C is_______ binary tree. A. Strictly,Strictly,complete B. Complete,no strictly, strictly C. Strictly,not strictly,strictly D. Strictly,not strictly,complete

90. The electromagnetic waves ranging in frequencies between 1 GHz and 300 GHz are called____ A. Radio waves B. Microwaves C. Infrared waves D. Light waves

Given the following expression tree,identify the correct arithmetic expression:

A. (A+B)*/A-C B. A+(B*C)/(A-C) C. A+B*C/A-C

Page 5: Part - IV Computer Science - Solutionsadda

D. (A+B*C)/(A-

Given the following two statements about SQL (a) An SQL query can contain HAVING clause only if it has GROUP BY clause. (b) In an SQL query “SELECT_FROM_WHERE_GROUP BY_HAVING”, HAVING is executed before WHERE. Which of the following is correct? A. (a) and (b) are true B. (a) is true, (b) is false C. (a) is false, (b) is true D. (a) and (b) both are false

93. Which of the following protocol is used for transforming electronic mail messages from one machine to another? A. FTP B. SMTP C. SNMP D. STTP

94. Exclusive OR(XOR) is a special gate whose output is 1 only if: A. All inputs are 0 B. All inputs are 1 C. Odd numbers of inputs are 1 D. Even number of inputs are 1

95. MPEG involves both spatial compression and temporal compression. The spatial compression is similar to JPEG and temporal compression removes_____frames. A. Voice B. Spatial C. Temporal D. Redundant

96. Hardware mechanism that enables a device to notify the CPU is called: A. Busy-waiting B. Interrupt C. Polling D. DMA

97.The device bridge is used at ____ layer of OSI reference model. A. Datalink B. Network C. Transport D. Application

Page 6: Part - IV Computer Science - Solutionsadda

98. Runtime polymorphism is achieved by _____ A. Friend function B. Virtual function C. Operator overloading D. Function overloading

99. How many characters per second (7 bits+1 parity) can be transmitted over a 2400 bps line if the transfer is asynchronous(1 start and 1 stop bit)? A. 240 B. 250 C. 275 D. 300

100. Which of the following flipflops does not have a problem of race condition? A. T flip flop B. JK flip flop C. Clocked-RS flip flop D. Clocked D flip flop

101.Time taken to switch between user and kernel models is___the time taken to switch between two processes. A. More than B. Independent of C. Less than D. Equal to

102.The worst case complexity for searching an element in binary search tree is: A. O(lgn) B. O(nlogn) C. O(n2) D. O(n)

103. The period of a signal is 100ms. What is its frequency in kilohertz? A. 10-1 kHz B. 10 -2 kHz C. 10-3 kHz D. 10-4 kHz

104.How many page faults occur in LRU page replacement algorithm for the given reference string, with four page frames 7,0,1,2,0,3,4,2,3,0,3,2,1,2,0,1 A. 6 B. 8 C. 7 D. 9

Page 7: Part - IV Computer Science - Solutionsadda

105. Usually pure virtual function A. Has complete function body B. Will never be called C. Will be called only to delete an object D. Is defined only in derived class

106.Von neumann computer architecture is____ A. SISD B. SIMD C. MIMD D. MISD

107. ____key must satisfy referential integrity in a relation, while__key must satisfy entity integrity. A. Candidate, primary B. Foreign,primary C. Primary,foreign D. Foreign,superkey

The _____property is used to return or sets value determines whether the conrolcan respond to user generated events. A. Auto B. Enable C. Value D. Visible

109. Use of virtual function implies____ A. Overloading B. Overriding C. Static binding D. Dynamic binding

110.Machine that places the request to access the data, is generally called as___ A. Server machine B. Client machine C. Request machine D. Intelligent machine

111. Given a set of four, two resources with two units, each. The following resources allocation graph exits at a point in time:

Page 8: Part - IV Computer Science - Solutionsadda

The graph indicates: A. Cycle and deadlock B. No cycle but deadlock C. Neither cycle nor deadlock D. Cycle but no deadlock

112. Which of the following applications may use a stack? (a) Parenthesis balancing program (b) Process scheduling operating system (c) Conversion of infix arithmetic expression to postfix form A. (a) and (b) B. (b) and (c) C. (a) and (c) D. (a),(b) and (c)

113. Consider the following code segment in C++. How many times the for loop will be repeated? int main() { Int f=1; for(;f;) cout<<”f=”<<f++<<”\n”; Return 0; } A. 10 times B. Not even once C. Repeated forever D. Only once

114. Which of the following are language processor? A. Assembler and editor B. Compiler and word processor C. Only Assembler and compiler D. Assembler,Compiler and Interpreter

Page 9: Part - IV Computer Science - Solutionsadda

115. Consider the following code segment: Int x=22,y=15; x=(x>y)?(x+y):(x-y); What will be the value of x after the code is executed? A. 22 B. 37 C. 7 D. 37 and 7

116. How many gate(s) would be required to implement the following boolean expression after simplification? Expression: A’(C’D’+C’D)+AB(C’D’+C’D)+AB’C’ A. 1 B. 2 C. 3 D. 4

117. Given below are several usages of the anchor tag in HTML. (a) <A href=”http://w3c.org/test.html”> (b) <A href=”/HTML/test.html”> Test</A> (c) <A href=”test.html”>Test</A> (d) <A href=”test.html#top”>Test</A> Which of the above are valid? A. (a) and (b) only B. (a),(b) and (c) only C. (b),(c) and (d) only D. (a),(b),(c) and(d)

118. The function setcookie() is used to____ A. Enable or disable cookie support B. Declare cookie variables C. Store data in cookie variables D. Clear data from cookie variables

119. In which of the following, the density of the core remains constant from the center to the edges? A. Single mode fiber B. Multimedia step-index fiber C. Multimode graded index fiber D. Single mode step index fiber

120. A device which converts BCD to seven segment is called____ A. Encoder B. Decoder C. Multiplexer D. Demultiplexer

Page 10: Part - IV Computer Science - Solutionsadda

121. Additional information sent when an exception is thrown may be placed in___ A. The throw keyword B. The function that caused the error C. The catch block D. An object of the exception class

122. When a mobile telephone physically moves from one cell to another cell, the base station transfers ownership to the cell getting strongest signal. This process is known as____ A. Handoff B. Mobile routing C. Mobile switching D. Cell Switching

123. Which of the following expression results in zero? A. (0+0+1)(0+0+1) B. (0+0+0)(0+1+1) C. (1+0+0)(1+1+1) D. (0+1+0)(1+0+1)

124.Which of the following is a special effect in motion pictures and animation that changes one image/picture into another through a seamless transition? A. Modeling B. Morphing C. Animating D. Wrapping

125.______ variables are not reinitialized each time visual basic invokes a procedure and thus retains or preserves value even when a procedure ends A. Static B. Dynamic C. Virtual D. Private

126. Which of the following is not correct in C++? A. x-=2; is the same as x=x-2; B. x*=2; is the same as x=x*2; C. x%=2; is the same as x=x/2; D. x/=2; is the same as x=x/2;

127. Consider the following Java code segment: Public class while /*line1*/ { Public void loop()

Page 11: Part - IV Computer Science - Solutionsadda

{ Int x=0; while(1) /*line 6*/ { system.out.println(“x plus one is”+(x+1)); } } } Which of the following is true? A. There is a syntax error in line -1 B. There are syntax errors in,line -1 and line -6 C. There is a syntax error in line -6 D. No syntax error

128. The Communication between the components in a microcomputer takes place via the address and ____ A. I/O bus B. Data bus C. Address bus D. Control lines

129. Which of the following statements is incorrect? A. Data definition languages is used by DBA and database designers to define schemas B. Storage definition language is used to specify the internal schema. C. Storage definition language is used to insert,delete and update data D. Data definition languages is used to retrieve data from the database

130. Given the list of tasks in Col-A and list of data structure in Col-B. Identify the best match A B

(a) Recursion (i) Binary tree

(b) Scheduling (ii) stack

(c) sorting (iii) Queue (a) (b) (c) A. (i) (iii) (ii) B. (ii) (i) (iii) C. (iii) (ii) (i) D. (ii) (iii) (i)

131. In the context of while loop do while loop in C++, which of the following is not true? A. Both the loops are repetitive in nature B. Boh are conditional loops C. Both will be executed at least once D. Both are terminated when the condition become false

Page 12: Part - IV Computer Science - Solutionsadda

132. In single-precision, double-precision and extended-precision representation of floating point numbers, as defined by ANSI/IEEE standard 754-1985, the no.of bits used are____ respectively. A. 32,64 and 80 B. 32,64 and 128 C. 16,32 and 64 D. 16,32 and 80

133. Parent class of all java classes is____ A. Java.lang.system B. Java.lang.object C. Java.lang.class D. Java.lang,reflect.object

134. Following numbers(items) are inserted in order into binary search tree. 40,60,50,33,55,11 Then the number of items in left and right subtrees of the root are_____ A. (3,3) B. (2,3) C. (3,2) D. (2,4)

135. Which of the following method is used to refresh the webpage in javascript? A. window.reload() B. location.reload() C. window.refresh() D. page.refresh()

136. In Vb, to change the size of a dynamic array,___ is used at the point in the code where you want it to change A. Dim B. Redim C. Chdim D. Bydim

137. Consider the code segment written below in C++: if (count<10) //if#1 if((count%4)==2) //if#2 count<<”condition:white\n”; else //(indentation is wrong) count<<”condition is:tan\n”; There are 2 if statements and one else. To which if, the else statement belong? A. It belongs to if#1 B. It belongs to if#2 C. It belongs to both the if statements

Page 13: Part - IV Computer Science - Solutionsadda

D. It is independent

138. An interface that provides I/o transfer of data directly to and from the memory unit and the peripheral is termed as_____ A. DDA B. Serial Interface C. BR D. DMA

139. The _____attribute of <TABLE> tag is used to control the distance between the data in a cell and the boundaries of the cell. A. Colspan B. Rowspan C. Cellpadding D. cellspacing

140. For which of the following tasks, stack is not suitable data structure? (a) Binary search in an array (b) Breadth first search (c) Implementing function calls (d) Process scheduling A. (b) and (d) B. (b) and (c) C. (a) and (c) D. (c) and (d)

141. Which of the following is correct? A. In asymmetric multiprocessing, the processor are peers. B. In symmetric multiplexing, the processors are placed symmetrically on the motherboard C. Clustered systems are used for high performance computing D. All multiprocessor systems are multicore systems

142. File operations that manipulate the ‘open-count’ maintained for each entry in open file table include: A. Open,write B. Read,write C. Write,close D. open,close

143. Given an instance of the relation R(ABCD). A B C D

a1 b1 c1 d1

a1 b2 c2 d2

Page 14: Part - IV Computer Science - Solutionsadda

a2 b2 c2 d3

a3 b3 c4 d3 Which of the following functional dependencies hold? A. {AB} → D and D → A B. {AB → D and B → D C. {AB} → C and B → C D. {AB} → D and A → D

144. The simplified form of the boolean expression: (AB’(C+BD)+A’B’)C is: A. B’C B. A’B’C C. AB’C D. A’BC

145. When a circular queue is implemented in an array of the following condition holds when there is only one element in the queue? A. Front=rear=null B. Front=Rear!=null C. Front=Rear+1 D. Front=Rear-1

146. In a computer system, memory mapped access takes 100 nanoseconds when a page is found in TLB. In case the page is not TLB, it takes 400 nanoseconds to access. Assuming a hit ratio of 80%, the effective access time is: A. 120ns B. 160ns C. 200ns D. 500ns

147. Consider the following SQL query: (SELECT DISTINCT Pnum FROM PROJ,DEPT,EMP WHERE Dnum=Dnumber AND Mgr_ssn=Ssn AND Lname=’XXXX’) UNION (SELECT DISTINCT Pnum FROM PROJ,WORKS_ON,EMP WHERE Pnum=Pno AND ESSn=Ssn AND Lname=’XXXX’) This query retrieves: A. All project numbers for projects that involve an employee with last name ‘XXXX’, either as worker or as manager B. All project numbers for projects that involve an employee with last name ‘XXXX’ as manager C. Records of all employees with last name as ‘XXXX’ working in a project as manager D. All project numbers for projects in department Dnumber and where ‘XXXX’ is involved either as worker or as manager 148. The producer and consumer processes share the following variables:

Page 15: Part - IV Computer Science - Solutionsadda

Int n, Semaphore M=1 Semaphore E=n Semaphore F=0 The consumer process must execute ______ and before removing an item from buffer. A. signal(M), signal(F) B. signal(M), wait(F) C. Signal(F), wait(M) D. wait(F), wait(M)

149. Which of the following is not true in case of public inheritance in c++? A. Each public member in the base class is public in the derived class B. Each protected member in the base class is protected in the derived class C. Each private member in the base class remains private in the base class D. Each private member in the base class remains private in the derived class

150. The elements of the triangular array are stored as a vector in the A[1,1], A[2,1],A[2,2],A[3,1] A[3,2], A[3,3]..A[n,n] Assuming that A[1,1] is stored at location 1, addressing function for A[i,j] is given by; A. (i-1)/2 +j B. ((i-1)*i)/2 +j C. (i*i)/2 +j D. (i*j-1)/2